tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

– Network interfaces available for the capture:

tcpdump -D

1.eth1
2.any (Pseudo-device that captures on all interfaces)
3.lo

– Capture the traffic of a particular interface:

tcpdump -i eth0

– To capture the UDP traffic:

tcpdump udp

– To capture the TCP port 80 traffic:

tcpdump port http

– To capture the traffic from a filter stored in a file:

tcpdump -F file_name

To create a file where the filter is configured (here the TCP 80 port)

vim file_name

port 80

– To send the capture output in a file instead of directly on the screen:

tcpdump -w capture.log

– To read a capture file:

tcpdump -r capture.log

– To display the packets having “wordpress.com” as their source or destination address:

tcpdump host wordpress.com

– To display the FTP packets coming from 192.168.1.100 to 192.168.1.2:

tcpdump src 192.168.1.100 and dst 192.168.1.2 and port ftp

-And Finally to capture the password click here
Packets capture during a FTP connection. The FTP password can be easily intercepted because it is sent in clear text to the server.
We see in this capture the FTP username (amateur) and password (hosting).
You can use this incase you forget your ftp password and have stored it in your ftp client

Please note that this should not be used for any illegal and this blog will not be responsible for any actions that lead to illegal use